Skip to content

Commit d777f1b

Browse files
authored
Merge pull request #2484 from DeCohen/WI266100-page-deprecation-investigate-files
deprecated page
2 parents 46f09fb + 09ac1a8 commit d777f1b

8 files changed

+12
-231
lines changed

.openpublishing.redirection.defender-cloud-apps.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -994,6 +994,11 @@
994994
"source_path": "CloudAppSecurityDocs/what-is-cloud-app-security.md",
995995
"redirect_url": "/defender-cloud-apps/what-is-defender-for-cloud-apps",
996996
"redirect_document_id": true
997+
},
998+
{
999+
"source_path": "CloudAppSecurityDocs/file-filters.md",
1000+
"redirect_url": "/defender-cloud-apps/data-protection-policies",
1001+
"redirect_document_id": false
9971002
}
9981003
]
9991004
}

CloudAppSecurityDocs/best-practices.md

Lines changed: 1 addition & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -133,12 +133,9 @@ Defender for Cloud Apps provides you with the ability to investigate and monitor
133133
**For more information**:
134134

135135
* [Connect apps](enable-instant-visibility-protection-and-governance-actions-for-your-apps.md)
136-
* [File filters](file-filters.md)
136+
* [File policies](data-protection-policies.md)
137137
* [Content inspection](content-inspection.md)
138138

139-
---
140-
---
141-
---
142139
---
143140

144141
## Enforce DLP and compliance policies for data stored in the cloud
@@ -149,9 +146,6 @@ Defender for Cloud Apps provides you with the ability to investigate and monitor
149146

150147
* [Governing connected apps](governance-actions.md)
151148

152-
---
153-
---
154-
---
155149
---
156150

157151
## Block and protect download of sensitive data to unmanaged or risky devices

CloudAppSecurityDocs/data-protection-policies.md

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -11,8 +11,6 @@ ms.topic: how-to
1111

1212
File Policies allow you to enforce a wide range of automated processes using the cloud provider's APIs. Policies can be set to provide continuous compliance scans, legal eDiscovery tasks, DLP for sensitive content shared publicly, and many more use cases. Defender for Cloud Apps can monitor any file type based on more than 20 metadata filters (for example, access level, file type).
1313

14-
For a list of file filters that can be applied see [File filters in Microsoft Defender for Cloud Apps](file-filters.md).
15-
1614
## Supported file types
1715

1816
The Defender for Cloud Apps engines perform content inspection by extracting text from all common file types (100+) including Office, Open Office, compressed files, various rich text formats, XML, HTML, and more.

CloudAppSecurityDocs/file-filters.md

Lines changed: 0 additions & 212 deletions
This file was deleted.

CloudAppSecurityDocs/release-note-archive.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2263,7 +2263,7 @@ Released October 30, 2016
22632263
22642264
**New features:**
22652265
2266-
- To simplify filtering in the [activity log](activity-filters.md) and [file log](file-filters.md), similar filters have been consolidated. Use the activity filters: Activity object, IP address, and User. Use the file filter Collaborators to find exactly what you need.
2266+
- To simplify filtering in the [activity log](activity-filters.md) and [file log](data-protection-policies.md), similar filters have been consolidated. Use the activity filters: Activity object, IP address, and User. Use the file filter Collaborators to find exactly what you need.
22672267
- From the activity log drawer, under **Source**, you can click the link for **View raw data**. This action downloads the raw data used to generate the activity log for greater drill down into app events.
22682268
- Added support for extra login activities in Okta. [Private preview]
22692269
- Added support for extra login activities in Salesforce.

CloudAppSecurityDocs/toc.yml

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -296,8 +296,6 @@ items:
296296
href: activity-filters-queries.md
297297
- name: Investigate apps discovered by Microsoft Defender for Endpoint
298298
href: mde-investigation.md
299-
- name: Investigate files
300-
href: file-filters.md
301299
- name: Investigate accounts from connected apps
302300
href: accounts.md
303301
- name: Investigate OAuth apps

CloudAppSecurityDocs/tutorial-dlp.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -115,7 +115,7 @@ In conclusion, managing sensitive information in this way ensures that data save
115115
## See also
116116

117117
> [!div class="nextstepaction"]
118-
> [Understanding file data and filters](file-filters.md)
118+
> [Understanding file data and policies](data-protection-policies.md)
119119
120120
> [!div class="nextstepaction"]
121121
> [File policies](data-protection-policies.md)

CloudAppSecurityDocs/use-case-admin-quarantine.md

Lines changed: 4 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -18,8 +18,6 @@ In this tutorial, you'll learn how to use Microsoft Defender for Cloud Apps to d
1818
> - [Understand how quarantine works](#understand-how-quarantine-works)
1919
> - [Set up admin quarantine](#set-up-admin-quarantine)
2020
21-
> [!IMPORTANT]
22-
> Starting **September 1, 2024**, we'll be deprecating the **Files** page from Microsoft Defender for Cloud Apps. At that point, create and modify Information Protection policies and find malware files from the **Cloud apps > Policies > Policy Management** page. For more information, see [File policies in Microsoft Defender for Cloud Apps](data-protection-policies.md).
2321

2422
## Understand how quarantine works
2523

@@ -28,10 +26,10 @@ In this tutorial, you'll learn how to use Microsoft Defender for Cloud Apps to d
2826
> - For a list of apps that support admin quarantine, see the list of [governance actions](governance-actions.md).
2927
> - Files labeled by Defender for Cloud Apps can't be quarantined.
3028
> - Defender for Cloud Apps admin quarantine actions are limited to 100 actions per day.
31-
> - Sharepoint sites that are renamed either directly or as part of domain rename cannot be used as a folder location for admin quarantine.
29+
> - Sharepoint sites that are renamed either directly or as part of domain rename can't be used as a folder location for admin quarantine.
3230
3331

34-
1. When a file matches a policy, the **Admin quarantine** option will be available for the file.
32+
1. When a file matches a policy, the **Admin quarantine** option is available for the file.
3533

3634
1. Do one of the following actions to quarantine the file:
3735

@@ -53,7 +51,7 @@ In this tutorial, you'll learn how to use Microsoft Defender for Cloud Apps to d
5351

5452
1. The user can only access the tombstone file. In the file, they can read the custom guidelines provided by IT and the correlation ID to give IT to release the file.
5553

56-
1. When you receive the alert that a file has been quarantined, go to **Policies** -> **Policy Management**. Then select the **Information Protection** tab. In the row with your file policy, choose the three dots at the end of the line, and select **View all matches**. This will bring you the report of matches, where you can see the matching and quarantined files:
54+
1. When you receive the alert that a file has been quarantined, go to **Policies** -> **Policy Management**. Then select the **Information Protection** tab. In the row with your file policy, choose the three dots at the end of the line, and select **View all matches**. This brings you the report of matches, where you can see the matching and quarantined files:
5755

5856
![Quarantined files.](media/quarantine-alerts.png)
5957

@@ -71,7 +69,7 @@ In this tutorial, you'll learn how to use Microsoft Defender for Cloud Apps to d
7169
> [!NOTE]
7270
> When you restore a file:
7371
>
74-
> - Original shares are not restored, default folder inheritance applied.
72+
> - Original shares aren't restored, default folder inheritance applied.
7573
> - The restored file contains only the most recent version.
7674
> - The quarantine folder site access management is the customer's responsibility.
7775

0 commit comments

Comments
 (0)